1 /* SPDX-License-Identifier: LGPL-2.1-or-later */
6 #include <sys/socket.h>
11 #include "bpf-program.h"
12 #include "condition.h"
13 #include "emergency-action.h"
15 #include "show-status.h"
17 #include "unit-file.h"
20 typedef struct UnitRef UnitRef
;
22 typedef enum KillOperation
{
24 KILL_TERMINATE_AND_LOG
,
29 _KILL_OPERATION_INVALID
= -EINVAL
,
32 typedef enum CollectMode
{
34 COLLECT_INACTIVE_OR_FAILED
,
36 _COLLECT_MODE_INVALID
= -EINVAL
,
39 static inline bool UNIT_IS_ACTIVE_OR_RELOADING(UnitActiveState t
) {
40 return IN_SET(t
, UNIT_ACTIVE
, UNIT_RELOADING
);
43 static inline bool UNIT_IS_ACTIVE_OR_ACTIVATING(UnitActiveState t
) {
44 return IN_SET(t
, UNIT_ACTIVE
, UNIT_ACTIVATING
, UNIT_RELOADING
);
47 static inline bool UNIT_IS_INACTIVE_OR_DEACTIVATING(UnitActiveState t
) {
48 return IN_SET(t
, UNIT_INACTIVE
, UNIT_FAILED
, UNIT_DEACTIVATING
);
51 static inline bool UNIT_IS_INACTIVE_OR_FAILED(UnitActiveState t
) {
52 return IN_SET(t
, UNIT_INACTIVE
, UNIT_FAILED
);
55 static inline bool UNIT_IS_LOAD_COMPLETE(UnitLoadState t
) {
56 return t
>= 0 && t
< _UNIT_LOAD_STATE_MAX
&& t
!= UNIT_STUB
&& t
!= UNIT_MERGED
;
59 /* Stores the 'reason' a dependency was created as a bit mask, i.e. due to which configuration source it came to be. We
60 * use this so that we can selectively flush out parts of dependencies again. Note that the same dependency might be
61 * created as a result of multiple "reasons", hence the bitmask. */
62 typedef enum UnitDependencyMask
{
63 /* Configured directly by the unit file, .wants/.requires symlink or drop-in, or as an immediate result of a
64 * non-dependency option configured that way. */
65 UNIT_DEPENDENCY_FILE
= 1 << 0,
67 /* As unconditional implicit dependency (not affected by unit configuration — except by the unit name and
69 UNIT_DEPENDENCY_IMPLICIT
= 1 << 1,
71 /* A dependency effected by DefaultDependencies=yes. Note that dependencies marked this way are conceptually
72 * just a subset of UNIT_DEPENDENCY_FILE, as DefaultDependencies= is itself a unit file setting that can only
73 * be set in unit files. We make this two separate bits only to help debugging how dependencies came to be. */
74 UNIT_DEPENDENCY_DEFAULT
= 1 << 2,
76 /* A dependency created from udev rules */
77 UNIT_DEPENDENCY_UDEV
= 1 << 3,
79 /* A dependency created because of some unit's RequiresMountsFor= setting */
80 UNIT_DEPENDENCY_PATH
= 1 << 4,
82 /* A dependency initially configured from the mount unit file however the dependency will be updated
83 * from /proc/self/mountinfo as soon as the kernel will make the entry for that mount available in
85 UNIT_DEPENDENCY_MOUNT_FILE
= 1 << 5,
87 /* A dependency created or updated because of data read from /proc/self/mountinfo */
88 UNIT_DEPENDENCY_MOUNTINFO
= 1 << 6,
90 /* A dependency created because of data read from /proc/swaps and no other configuration source */
91 UNIT_DEPENDENCY_PROC_SWAP
= 1 << 7,
93 /* A dependency for units in slices assigned by directly setting Slice= */
94 UNIT_DEPENDENCY_SLICE_PROPERTY
= 1 << 8,
96 _UNIT_DEPENDENCY_MASK_FULL
= (1 << 9) - 1,
99 /* The Unit's dependencies[] hashmaps use this structure as value. It has the same size as a void pointer, and thus can
100 * be stored directly as hashmap value, without any indirection. Note that this stores two masks, as both the origin
101 * and the destination of a dependency might have created it. */
102 typedef union UnitDependencyInfo
{
105 UnitDependencyMask origin_mask
:16;
106 UnitDependencyMask destination_mask
:16;
108 } UnitDependencyInfo
;
110 /* Store information about why a unit was activated.
111 * We start with trigger units (.path/.timer), eventually it will be expanded to include more metadata. */
112 typedef struct ActivationDetails
{
114 UnitType trigger_unit_type
;
115 char *trigger_unit_name
;
118 /* For casting an activation event into the various unit-specific types */
119 #define DEFINE_ACTIVATION_DETAILS_CAST(UPPERCASE, MixedCase, UNIT_TYPE) \
120 static inline MixedCase* UPPERCASE(ActivationDetails *a) { \
121 if (_unlikely_(!a || a->trigger_unit_type != UNIT_##UNIT_TYPE)) \
124 return (MixedCase*) a; \
127 /* For casting the various unit types into a unit */
128 #define ACTIVATION_DETAILS(u) \
130 typeof(u) _u_ = (u); \
131 ActivationDetails *_w_ = _u_ ? &(_u_)->meta : NULL; \
135 ActivationDetails
*activation_details_new(Unit
*trigger_unit
);
136 ActivationDetails
*activation_details_ref(ActivationDetails
*p
);
137 ActivationDetails
*activation_details_unref(ActivationDetails
*p
);
138 void activation_details_serialize(ActivationDetails
*p
, FILE *f
);
139 int activation_details_deserialize(const char *key
, const char *value
, ActivationDetails
**info
);
140 int activation_details_append_env(ActivationDetails
*info
, char ***strv
);
141 int activation_details_append_pair(ActivationDetails
*info
, char ***strv
);
142 DEFINE_TRIVIAL_CLEANUP_FUNC(ActivationDetails
*, activation_details_unref
);
144 typedef struct ActivationDetailsVTable
{
145 /* How much memory does an object of this activation type need */
148 /* This should reset all type-specific variables. This should not allocate memory, and is called
149 * with zero-initialized data. It should hence only initialize variables that need to be set != 0. */
150 void (*init
)(ActivationDetails
*info
, Unit
*trigger_unit
);
152 /* This should free all type-specific variables. It should be idempotent. */
153 void (*done
)(ActivationDetails
*info
);
155 /* This should serialize all type-specific variables. */
156 void (*serialize
)(ActivationDetails
*info
, FILE *f
);
158 /* This should deserialize all type-specific variables, one at a time. */
159 int (*deserialize
)(const char *key
, const char *value
, ActivationDetails
**info
);
161 /* This should format the type-specific variables for the env block of the spawned service,
162 * and return the number of added items. */
163 int (*append_env
)(ActivationDetails
*info
, char ***strv
);
165 /* This should append type-specific variables as key/value pairs for the D-Bus property of the job,
166 * and return the number of added pairs. */
167 int (*append_pair
)(ActivationDetails
*info
, char ***strv
);
168 } ActivationDetailsVTable
;
170 extern const ActivationDetailsVTable
* const activation_details_vtable
[_UNIT_TYPE_MAX
];
172 static inline const ActivationDetailsVTable
* ACTIVATION_DETAILS_VTABLE(const ActivationDetails
*a
) {
174 assert(a
->trigger_unit_type
< _UNIT_TYPE_MAX
);
176 return activation_details_vtable
[a
->trigger_unit_type
];
179 /* Newer LLVM versions don't like implicit casts from large pointer types to smaller enums, hence let's add
180 * explicit type-safe helpers for that. */
181 static inline UnitDependency
UNIT_DEPENDENCY_FROM_PTR(const void *p
) {
182 return PTR_TO_INT(p
);
185 static inline void* UNIT_DEPENDENCY_TO_PTR(UnitDependency d
) {
186 return INT_TO_PTR(d
);
192 /* Keeps tracks of references to a unit. This is useful so
193 * that we can merge two units if necessary and correct all
194 * references to them */
196 Unit
*source
, *target
;
197 LIST_FIELDS(UnitRef
, refs_by_target
);
200 typedef struct Unit
{
204 UnitLoadState load_state
;
207 char *id
; /* The one special name that we use for identification */
210 Set
*aliases
; /* All the other names. */
212 /* For each dependency type we can look up another Hashmap with this, whose key is a Unit* object,
213 * and whose value encodes why the dependency exists, using the UnitDependencyInfo type. i.e. a
214 * Hashmap(UnitDependency → Hashmap(Unit* → UnitDependencyInfo)) */
215 Hashmap
*dependencies
;
217 /* Similar, for RequiresMountsFor= path dependencies. The key is the path, the value the
218 * UnitDependencyInfo type */
219 Hashmap
*requires_mounts_for
;
222 char **documentation
;
224 /* The SELinux context used for checking access to this unit read off the unit file at load time (do
225 * not confuse with the selinux_context field in ExecContext which is the SELinux context we'll set
227 char *access_selinux_context
;
229 char *fragment_path
; /* if loaded from a config file this is the primary path to it */
230 char *source_path
; /* if converted, the source file */
233 usec_t fragment_not_found_timestamp_hash
;
234 usec_t fragment_mtime
;
238 /* If this is a transient unit we are currently writing, this is where we are writing it to */
239 FILE *transient_file
;
242 sd_bus_message
*pending_freezer_invocation
;
243 FreezerState freezer_state
;
245 /* Job timeout and action to take */
246 EmergencyAction job_timeout_action
;
248 usec_t job_running_timeout
;
249 char *job_timeout_reboot_arg
;
251 /* If there is something to do with this unit, then this is the installed job for it */
254 /* JOB_NOP jobs are special and can be installed without disturbing the real job. */
257 /* The slot used for watching NameOwnerChanged signals */
258 sd_bus_slot
*match_bus_slot
;
259 sd_bus_slot
*get_name_owner_slot
;
261 /* References to this unit from clients */
262 sd_bus_track
*bus_track
;
263 char **deserialized_refs
;
265 /* References to this */
266 LIST_HEAD(UnitRef
, refs_by_target
);
268 /* Conditions to check */
269 LIST_HEAD(Condition
, conditions
);
270 LIST_HEAD(Condition
, asserts
);
272 dual_timestamp condition_timestamp
;
273 dual_timestamp assert_timestamp
;
275 /* Updated whenever the low-level state changes */
276 dual_timestamp state_change_timestamp
;
278 /* Updated whenever the (high-level) active state enters or leaves the active or inactive states */
279 dual_timestamp inactive_exit_timestamp
;
280 dual_timestamp active_enter_timestamp
;
281 dual_timestamp active_exit_timestamp
;
282 dual_timestamp inactive_enter_timestamp
;
285 LIST_FIELDS(Unit
, units_by_type
);
288 LIST_FIELDS(Unit
, load_queue
);
291 LIST_FIELDS(Unit
, dbus_queue
);
294 LIST_FIELDS(Unit
, cleanup_queue
);
297 LIST_FIELDS(Unit
, gc_queue
);
299 /* CGroup realize members queue */
300 LIST_FIELDS(Unit
, cgroup_realize_queue
);
302 /* cgroup empty queue */
303 LIST_FIELDS(Unit
, cgroup_empty_queue
);
305 /* cgroup OOM queue */
306 LIST_FIELDS(Unit
, cgroup_oom_queue
);
308 /* Target dependencies queue */
309 LIST_FIELDS(Unit
, target_deps_queue
);
311 /* Queue of units with StopWhenUnneeded= set that shall be checked for clean-up. */
312 LIST_FIELDS(Unit
, stop_when_unneeded_queue
);
314 /* Queue of units that have an Uphold= dependency from some other unit, and should be checked for starting */
315 LIST_FIELDS(Unit
, start_when_upheld_queue
);
317 /* Queue of units that have a BindTo= dependency on some other unit, and should possibly be shut down */
318 LIST_FIELDS(Unit
, stop_when_bound_queue
);
320 /* PIDs we keep an eye on. Note that a unit might have many
321 * more, but these are the ones we care enough about to
322 * process SIGCHLD for */
325 /* Used in SIGCHLD and sd_notify() message event invocation logic to avoid that we dispatch the same event
326 * multiple times on the same unit. */
330 /* Used during GC sweeps */
333 /* Error code when we didn't manage to load the unit (negative) */
336 /* Put a ratelimit on unit starting */
337 RateLimit start_ratelimit
;
338 EmergencyAction start_limit_action
;
340 /* The unit has been marked for reload, restart, etc. Stored as 1u << marker1 | 1u << marker2. */
343 /* What to do on failure or success */
344 EmergencyAction success_action
, failure_action
;
345 int success_action_exit_status
, failure_action_exit_status
;
348 /* Make sure we never enter endless loops with the StopWhenUnneeded=, BindsTo=, Uphold= logic */
349 RateLimit auto_start_stop_ratelimit
;
351 /* Reference to a specific UID/GID */
355 /* Cached unit file state and preset */
356 UnitFileState unit_file_state
;
357 int unit_file_preset
;
359 /* Where the cpu.stat or cpuacct.usage was at the time the unit was started */
360 nsec_t cpu_usage_base
;
361 nsec_t cpu_usage_last
; /* the most recently read value */
363 /* The current counter of OOM kills initiated by systemd-oomd */
364 uint64_t managed_oom_kill_last
;
366 /* The current counter of the oom_kill field in the memory.events cgroup attribute */
367 uint64_t oom_kill_last
;
369 /* Where the io.stat data was at the time the unit was started */
370 uint64_t io_accounting_base
[_CGROUP_IO_ACCOUNTING_METRIC_MAX
];
371 uint64_t io_accounting_last
[_CGROUP_IO_ACCOUNTING_METRIC_MAX
]; /* the most recently read value */
373 /* Counterparts in the cgroup filesystem */
376 CGroupMask cgroup_realized_mask
; /* In which hierarchies does this unit's cgroup exist? (only relevant on cgroup v1) */
377 CGroupMask cgroup_enabled_mask
; /* Which controllers are enabled (or more correctly: enabled for the children) for this unit's cgroup? (only relevant on cgroup v2) */
378 CGroupMask cgroup_invalidated_mask
; /* A mask specifying controllers which shall be considered invalidated, and require re-realization */
379 CGroupMask cgroup_members_mask
; /* A cache for the controllers required by all children of this cgroup (only relevant for slice units) */
381 /* Inotify watch descriptors for watching cgroup.events and memory.events on cgroupv2 */
382 int cgroup_control_inotify_wd
;
383 int cgroup_memory_inotify_wd
;
385 /* Device Controller BPF program */
386 BPFProgram
*bpf_device_control_installed
;
388 /* IP BPF Firewalling/accounting */
389 int ip_accounting_ingress_map_fd
;
390 int ip_accounting_egress_map_fd
;
391 uint64_t ip_accounting_extra
[_CGROUP_IP_ACCOUNTING_METRIC_MAX
];
393 int ipv4_allow_map_fd
;
394 int ipv6_allow_map_fd
;
395 int ipv4_deny_map_fd
;
396 int ipv6_deny_map_fd
;
397 BPFProgram
*ip_bpf_ingress
, *ip_bpf_ingress_installed
;
398 BPFProgram
*ip_bpf_egress
, *ip_bpf_egress_installed
;
400 Set
*ip_bpf_custom_ingress
;
401 Set
*ip_bpf_custom_ingress_installed
;
402 Set
*ip_bpf_custom_egress
;
403 Set
*ip_bpf_custom_egress_installed
;
405 /* BPF programs managed (e.g. loaded to kernel) by an entity external to systemd,
406 * attached to unit cgroup by provided program fd and attach type. */
407 Hashmap
*bpf_foreign_by_key
;
409 FDSet
*initial_socket_bind_link_fds
;
411 /* BPF links to BPF programs attached to cgroup/bind{4|6} hooks and
412 * responsible for allowing or denying a unit to bind(2) to a socket
414 struct bpf_link
*ipv4_socket_bind_link
;
415 struct bpf_link
*ipv6_socket_bind_link
;
418 FDSet
*initial_restric_ifaces_link_fds
;
420 struct bpf_link
*restrict_ifaces_ingress_bpf_link
;
421 struct bpf_link
*restrict_ifaces_egress_bpf_link
;
424 /* Low-priority event source which is used to remove watched PIDs that have gone away, and subscribe to any new
425 * ones which might have appeared. */
426 sd_event_source
*rewatch_pids_event_source
;
428 /* How to start OnSuccess=/OnFailure= units */
429 JobMode on_success_job_mode
;
430 JobMode on_failure_job_mode
;
432 /* If the job had a specific trigger that needs to be advertised (eg: a path unit), store it. */
433 ActivationDetails
*activation_details
;
435 /* Tweaking the GC logic */
436 CollectMode collect_mode
;
438 /* The current invocation ID */
439 sd_id128_t invocation_id
;
440 char invocation_id_string
[SD_ID128_STRING_MAX
]; /* useful when logging */
442 /* Garbage collect us we nobody wants or requires us anymore */
443 bool stop_when_unneeded
;
445 /* Create default dependencies */
446 bool default_dependencies
;
448 /* Refuse manual starting, allow starting only indirectly via dependency. */
449 bool refuse_manual_start
;
451 /* Don't allow the user to stop this unit manually, allow stopping only indirectly via dependency. */
452 bool refuse_manual_stop
;
454 /* Allow isolation requests */
457 /* Ignore this unit when isolating */
458 bool ignore_on_isolate
;
460 /* Did the last condition check succeed? */
461 bool condition_result
;
464 /* Is this a transient unit? */
467 /* Is this a unit that is always running and cannot be stopped? */
470 /* Booleans indicating membership of this unit in the various queues */
471 bool in_load_queue
:1;
472 bool in_dbus_queue
:1;
473 bool in_cleanup_queue
:1;
475 bool in_cgroup_realize_queue
:1;
476 bool in_cgroup_empty_queue
:1;
477 bool in_cgroup_oom_queue
:1;
478 bool in_target_deps_queue
:1;
479 bool in_stop_when_unneeded_queue
:1;
480 bool in_start_when_upheld_queue
:1;
481 bool in_stop_when_bound_queue
:1;
483 bool sent_dbus_new_signal
:1;
485 bool job_running_timeout_set
:1;
490 bool cgroup_realized
:1;
491 bool cgroup_members_mask_valid
:1;
493 /* Reset cgroup accounting next time we fork something off */
494 bool reset_accounting
:1;
496 bool start_limit_hit
:1;
498 /* Did we already invoke unit_coldplug() for this unit? */
501 /* For transient units: whether to add a bus track reference after creating the unit */
502 bool bus_track_add
:1;
504 /* Remember which unit state files we created */
505 bool exported_invocation_id
:1;
506 bool exported_log_level_max
:1;
507 bool exported_log_extra_fields
:1;
508 bool exported_log_ratelimit_interval
:1;
509 bool exported_log_ratelimit_burst
:1;
511 /* Whether we warned about clamping the CPU quota period */
512 bool warned_clamping_cpu_quota_period
:1;
514 /* When writing transient unit files, stores which section we stored last. If < 0, we didn't write any yet. If
515 * == 0 we are in the [Unit] section, if > 0 we are in the unit type-specific section. */
516 signed int last_section_private
:2;
519 typedef struct UnitStatusMessageFormats
{
520 const char *starting_stopping
[2];
521 const char *finished_start_job
[_JOB_RESULT_MAX
];
522 const char *finished_stop_job
[_JOB_RESULT_MAX
];
523 /* If this entry is present, it'll be called to provide a context-dependent format string,
524 * or NULL to fall back to finished_{start,stop}_job; if those are NULL too, fall back to generic. */
525 const char *(*finished_job
)(Unit
*u
, JobType t
, JobResult result
);
526 } UnitStatusMessageFormats
;
528 /* Flags used when writing drop-in files or transient unit files */
529 typedef enum UnitWriteFlags
{
530 /* Write a runtime unit file or drop-in (i.e. one below /run) */
531 UNIT_RUNTIME
= 1 << 0,
533 /* Write a persistent drop-in (i.e. one below /etc) */
534 UNIT_PERSISTENT
= 1 << 1,
536 /* Place this item in the per-unit-type private section, instead of [Unit] */
537 UNIT_PRIVATE
= 1 << 2,
539 /* Apply specifier escaping before writing */
540 UNIT_ESCAPE_SPECIFIERS
= 1 << 3,
542 /* Escape elements of ExecStart= syntax before writing */
543 UNIT_ESCAPE_EXEC_SYNTAX
= 1 << 4,
545 /* Apply C escaping before writing */
546 UNIT_ESCAPE_C
= 1 << 5,
549 /* Returns true if neither persistent, nor runtime storage is requested, i.e. this is a check invocation only */
550 static inline bool UNIT_WRITE_FLAGS_NOOP(UnitWriteFlags flags
) {
551 return (flags
& (UNIT_RUNTIME
|UNIT_PERSISTENT
)) == 0;
556 typedef struct UnitVTable
{
557 /* How much memory does an object of this unit type need */
560 /* If greater than 0, the offset into the object where
561 * ExecContext is found, if the unit type has that */
562 size_t exec_context_offset
;
564 /* If greater than 0, the offset into the object where
565 * CGroupContext is found, if the unit type has that */
566 size_t cgroup_context_offset
;
568 /* If greater than 0, the offset into the object where
569 * KillContext is found, if the unit type has that */
570 size_t kill_context_offset
;
572 /* If greater than 0, the offset into the object where the
573 * pointer to ExecRuntime is found, if the unit type has
575 size_t exec_runtime_offset
;
577 /* If greater than 0, the offset into the object where the pointer to DynamicCreds is found, if the unit type
579 size_t dynamic_creds_offset
;
581 /* The name of the configuration file section with the private settings of this unit */
582 const char *private_section
;
584 /* Config file sections this unit type understands, separated
586 const char *sections
;
588 /* This should reset all type-specific variables. This should
589 * not allocate memory, and is called with zero-initialized
590 * data. It should hence only initialize variables that need
592 void (*init
)(Unit
*u
);
594 /* This should free all type-specific variables. It should be
596 void (*done
)(Unit
*u
);
598 /* Actually load data from disk. This may fail, and should set
599 * load_state to UNIT_LOADED, UNIT_MERGED or leave it at
600 * UNIT_STUB if no configuration could be found. */
601 int (*load
)(Unit
*u
);
603 /* During deserialization we only record the intended state to return to. With coldplug() we actually put the
604 * deserialized state in effect. This is where unit_notify() should be called to start things up. Note that
605 * this callback is invoked *before* we leave the reloading state of the manager, i.e. *before* we consider the
606 * reloading to be complete. Thus, this callback should just restore the exact same state for any unit that was
607 * in effect before the reload, i.e. units should not catch up with changes happened during the reload. That's
608 * what catchup() below is for. */
609 int (*coldplug
)(Unit
*u
);
611 /* This is called shortly after all units' coldplug() call was invoked, and *after* the manager left the
612 * reloading state. It's supposed to catch up with state changes due to external events we missed so far (for
613 * example because they took place while we were reloading/reexecing) */
614 void (*catchup
)(Unit
*u
);
616 void (*dump
)(Unit
*u
, FILE *f
, const char *prefix
);
618 int (*start
)(Unit
*u
);
619 int (*stop
)(Unit
*u
);
620 int (*reload
)(Unit
*u
);
622 int (*kill
)(Unit
*u
, KillWho w
, int signo
, int code
, int value
, sd_bus_error
*error
);
624 /* Clear out the various runtime/state/cache/logs/configuration data */
625 int (*clean
)(Unit
*u
, ExecCleanMask m
);
627 /* Freeze the unit */
628 int (*freeze
)(Unit
*u
);
629 int (*thaw
)(Unit
*u
);
630 bool (*can_freeze
)(Unit
*u
);
632 /* Return which kind of data can be cleaned */
633 int (*can_clean
)(Unit
*u
, ExecCleanMask
*ret
);
635 bool (*can_reload
)(Unit
*u
);
637 /* Serialize state and file descriptors that should be carried over into the new
638 * instance after reexecution. */
639 int (*serialize
)(Unit
*u
, FILE *f
, FDSet
*fds
);
641 /* Restore one item from the serialization */
642 int (*deserialize_item
)(Unit
*u
, const char *key
, const char *data
, FDSet
*fds
);
644 /* Try to match up fds with what we need for this unit */
645 void (*distribute_fds
)(Unit
*u
, FDSet
*fds
);
647 /* Boils down the more complex internal state of this unit to
648 * a simpler one that the engine can understand */
649 UnitActiveState (*active_state
)(Unit
*u
);
651 /* Returns the substate specific to this unit type as
652 * string. This is purely information so that we can give the
653 * user a more fine grained explanation in which actual state a
655 const char* (*sub_state_to_string
)(Unit
*u
);
657 /* Additionally to UnitActiveState determine whether unit is to be restarted. */
658 bool (*will_restart
)(Unit
*u
);
660 /* Return false when there is a reason to prevent this unit from being gc'ed
661 * even though nothing references it and it isn't active in any way. */
662 bool (*may_gc
)(Unit
*u
);
664 /* Return true when the unit is not controlled by the manager (e.g. extrinsic mounts). */
665 bool (*is_extrinsic
)(Unit
*u
);
667 /* When the unit is not running and no job for it queued we shall release its runtime resources */
668 void (*release_resources
)(Unit
*u
);
670 /* Invoked on every child that died */
671 void (*sigchld_event
)(Unit
*u
, pid_t pid
, int code
, int status
);
673 /* Reset failed state if we are in failed state */
674 void (*reset_failed
)(Unit
*u
);
676 /* Called whenever any of the cgroups this unit watches for ran empty */
677 void (*notify_cgroup_empty
)(Unit
*u
);
679 /* Called whenever an OOM kill event on this unit was seen */
680 void (*notify_cgroup_oom
)(Unit
*u
, bool managed_oom
);
682 /* Called whenever a process of this unit sends us a message */
683 void (*notify_message
)(Unit
*u
, const struct ucred
*ucred
, char * const *tags
, FDSet
*fds
);
685 /* Called whenever a name this Unit registered for comes or goes away. */
686 void (*bus_name_owner_change
)(Unit
*u
, const char *new_owner
);
688 /* Called for each property that is being set */
689 int (*bus_set_property
)(Unit
*u
, const char *name
, sd_bus_message
*message
, UnitWriteFlags flags
, sd_bus_error
*error
);
691 /* Called after at least one property got changed to apply the necessary change */
692 int (*bus_commit_properties
)(Unit
*u
);
694 /* Return the unit this unit is following */
695 Unit
*(*following
)(Unit
*u
);
697 /* Return the set of units that are following each other */
698 int (*following_set
)(Unit
*u
, Set
**s
);
700 /* Invoked each time a unit this unit is triggering changes
701 * state or gains/loses a job */
702 void (*trigger_notify
)(Unit
*u
, Unit
*trigger
);
704 /* Called whenever CLOCK_REALTIME made a jump */
705 void (*time_change
)(Unit
*u
);
707 /* Called whenever /etc/localtime was modified */
708 void (*timezone_change
)(Unit
*u
);
710 /* Returns the next timeout of a unit */
711 int (*get_timeout
)(Unit
*u
, usec_t
*timeout
);
713 /* Returns the main PID if there is any defined, or 0. */
714 pid_t (*main_pid
)(Unit
*u
);
716 /* Returns the main PID if there is any defined, or 0. */
717 pid_t (*control_pid
)(Unit
*u
);
719 /* Returns true if the unit currently needs access to the console */
720 bool (*needs_console
)(Unit
*u
);
722 /* Returns the exit status to propagate in case of FailureAction=exit/SuccessAction=exit; usually returns the
723 * exit code of the "main" process of the service or similar. */
724 int (*exit_status
)(Unit
*u
);
726 /* Return a copy of the status string pointer. */
727 const char* (*status_text
)(Unit
*u
);
729 /* Like the enumerate() callback further down, but only enumerates the perpetual units, i.e. all units that
730 * unconditionally exist and are always active. The main reason to keep both enumeration functions separate is
731 * philosophical: the state of perpetual units should be put in place by coldplug(), while the state of those
732 * discovered through regular enumeration should be put in place by catchup(), see below. */
733 void (*enumerate_perpetual
)(Manager
*m
);
735 /* This is called for each unit type and should be used to enumerate units already existing in the system
736 * internally and load them. However, everything that is loaded here should still stay in inactive state. It is
737 * the job of the catchup() call above to put the units into the discovered state. */
738 void (*enumerate
)(Manager
*m
);
740 /* Type specific cleanups. */
741 void (*shutdown
)(Manager
*m
);
743 /* If this function is set and returns false all jobs for units
744 * of this type will immediately fail. */
745 bool (*supported
)(void);
747 /* If this function is set, it's invoked first as part of starting a unit to allow start rate
748 * limiting checks to occur before we do anything else. */
749 int (*can_start
)(Unit
*u
);
751 /* The strings to print in status messages */
752 UnitStatusMessageFormats status_message_formats
;
754 /* True if transient units of this type are OK */
757 /* True if cgroup delegation is permissible */
760 /* True if the unit type triggers other units, i.e. can have a UNIT_TRIGGERS dependency */
763 /* True if the unit type knows a failure state, and thus can be source of an OnFailure= dependency */
766 /* True if units of this type shall be startable only once and then never again */
769 /* Do not serialize this unit when preparing for root switch */
770 bool exclude_from_switch_root_serialization
;
772 /* True if queued jobs of this type should be GC'ed if no other job needs them anymore */
775 /* True if systemd-oomd can monitor and act on this unit's recursive children's cgroups */
776 bool can_set_managed_oom
;
779 extern const UnitVTable
* const unit_vtable
[_UNIT_TYPE_MAX
];
781 static inline const UnitVTable
* UNIT_VTABLE(const Unit
*u
) {
782 return unit_vtable
[u
->type
];
785 /* For casting a unit into the various unit types */
786 #define DEFINE_CAST(UPPERCASE, MixedCase) \
787 static inline MixedCase* UPPERCASE(Unit *u) { \
788 if (_unlikely_(!u || u->type != UNIT_##UPPERCASE)) \
791 return (MixedCase*) u; \
794 /* For casting the various unit types into a unit */
797 typeof(u) _u_ = (u); \
798 Unit *_w_ = _u_ ? &(_u_)->meta : NULL; \
802 #define UNIT_HAS_EXEC_CONTEXT(u) (UNIT_VTABLE(u)->exec_context_offset > 0)
803 #define UNIT_HAS_CGROUP_CONTEXT(u) (UNIT_VTABLE(u)->cgroup_context_offset > 0)
804 #define UNIT_HAS_KILL_CONTEXT(u) (UNIT_VTABLE(u)->kill_context_offset > 0)
806 Unit
* unit_has_dependency(const Unit
*u
, UnitDependencyAtom atom
, Unit
*other
);
807 int unit_get_dependency_array(const Unit
*u
, UnitDependencyAtom atom
, Unit
***ret_array
);
809 static inline Hashmap
* unit_get_dependencies(Unit
*u
, UnitDependency d
) {
810 return hashmap_get(u
->dependencies
, UNIT_DEPENDENCY_TO_PTR(d
));
813 static inline Unit
* UNIT_TRIGGER(Unit
*u
) {
814 return unit_has_dependency(u
, UNIT_ATOM_TRIGGERS
, NULL
);
817 static inline Unit
* UNIT_GET_SLICE(const Unit
*u
) {
818 return unit_has_dependency(u
, UNIT_ATOM_IN_SLICE
, NULL
);
821 Unit
* unit_new(Manager
*m
, size_t size
);
822 Unit
* unit_free(Unit
*u
);
823 DEFINE_TRIVIAL_CLEANUP_FUNC(Unit
*, unit_free
);
825 int unit_new_for_name(Manager
*m
, size_t size
, const char *name
, Unit
**ret
);
826 int unit_add_name(Unit
*u
, const char *name
);
828 int unit_add_dependency(Unit
*u
, UnitDependency d
, Unit
*other
, bool add_reference
, UnitDependencyMask mask
);
829 int unit_add_two_dependencies(Unit
*u
, UnitDependency d
, UnitDependency e
, Unit
*other
, bool add_reference
, UnitDependencyMask mask
);
831 int unit_add_dependency_by_name(Unit
*u
, UnitDependency d
, const char *name
, bool add_reference
, UnitDependencyMask mask
);
832 int unit_add_two_dependencies_by_name(Unit
*u
, UnitDependency d
, UnitDependency e
, const char *name
, bool add_reference
, UnitDependencyMask mask
);
834 int unit_add_exec_dependencies(Unit
*u
, ExecContext
*c
);
836 int unit_choose_id(Unit
*u
, const char *name
);
837 int unit_set_description(Unit
*u
, const char *description
);
839 bool unit_may_gc(Unit
*u
);
841 static inline bool unit_is_extrinsic(Unit
*u
) {
842 return u
->perpetual
||
843 (UNIT_VTABLE(u
)->is_extrinsic
&& UNIT_VTABLE(u
)->is_extrinsic(u
));
846 static inline const char* unit_status_text(Unit
*u
) {
847 if (u
&& UNIT_VTABLE(u
)->status_text
)
848 return UNIT_VTABLE(u
)->status_text(u
);
852 void unit_add_to_load_queue(Unit
*u
);
853 void unit_add_to_dbus_queue(Unit
*u
);
854 void unit_add_to_cleanup_queue(Unit
*u
);
855 void unit_add_to_gc_queue(Unit
*u
);
856 void unit_add_to_target_deps_queue(Unit
*u
);
857 void unit_submit_to_stop_when_unneeded_queue(Unit
*u
);
858 void unit_submit_to_start_when_upheld_queue(Unit
*u
);
859 void unit_submit_to_stop_when_bound_queue(Unit
*u
);
861 int unit_merge(Unit
*u
, Unit
*other
);
862 int unit_merge_by_name(Unit
*u
, const char *other
);
864 Unit
*unit_follow_merge(Unit
*u
) _pure_
;
866 int unit_load_fragment_and_dropin(Unit
*u
, bool fragment_required
);
867 int unit_load(Unit
*unit
);
869 int unit_set_slice(Unit
*u
, Unit
*slice
);
870 int unit_set_default_slice(Unit
*u
);
872 const char *unit_description(Unit
*u
) _pure_
;
873 const char *unit_status_string(Unit
*u
, char **combined
);
875 bool unit_has_name(const Unit
*u
, const char *name
);
877 UnitActiveState
unit_active_state(Unit
*u
);
878 FreezerState
unit_freezer_state(Unit
*u
);
879 int unit_freezer_state_kernel(Unit
*u
, FreezerState
*ret
);
881 const char* unit_sub_state_to_string(Unit
*u
);
883 bool unit_can_reload(Unit
*u
) _pure_
;
884 bool unit_can_start(Unit
*u
) _pure_
;
885 bool unit_can_stop(Unit
*u
) _pure_
;
886 bool unit_can_isolate(Unit
*u
) _pure_
;
888 int unit_start(Unit
*u
, ActivationDetails
*details
);
889 int unit_stop(Unit
*u
);
890 int unit_reload(Unit
*u
);
892 int unit_kill(Unit
*u
, KillWho w
, int signo
, int code
, int value
, sd_bus_error
*error
);
893 int unit_kill_common(Unit
*u
, KillWho who
, int signo
, int code
, int value
, pid_t main_pid
, pid_t control_pid
, sd_bus_error
*error
);
895 void unit_notify_cgroup_oom(Unit
*u
, bool managed_oom
);
897 typedef enum UnitNotifyFlags
{
898 UNIT_NOTIFY_RELOAD_FAILURE
= 1 << 0,
899 UNIT_NOTIFY_WILL_AUTO_RESTART
= 1 << 1,
902 void unit_notify(Unit
*u
, UnitActiveState os
, UnitActiveState ns
, UnitNotifyFlags flags
);
904 int unit_watch_pid(Unit
*u
, pid_t pid
, bool exclusive
);
905 void unit_unwatch_pid(Unit
*u
, pid_t pid
);
906 void unit_unwatch_all_pids(Unit
*u
);
908 int unit_enqueue_rewatch_pids(Unit
*u
);
909 void unit_dequeue_rewatch_pids(Unit
*u
);
911 int unit_install_bus_match(Unit
*u
, sd_bus
*bus
, const char *name
);
912 int unit_watch_bus_name(Unit
*u
, const char *name
);
913 void unit_unwatch_bus_name(Unit
*u
, const char *name
);
915 bool unit_job_is_applicable(Unit
*u
, JobType j
);
917 int set_unit_path(const char *p
);
919 char *unit_dbus_path(Unit
*u
);
920 char *unit_dbus_path_invocation_id(Unit
*u
);
922 int unit_load_related_unit(Unit
*u
, const char *type
, Unit
**_found
);
924 int unit_add_node_dependency(Unit
*u
, const char *what
, UnitDependency d
, UnitDependencyMask mask
);
925 int unit_add_blockdev_dependency(Unit
*u
, const char *what
, UnitDependencyMask mask
);
927 int unit_coldplug(Unit
*u
);
928 void unit_catchup(Unit
*u
);
930 void unit_status_printf(Unit
*u
, StatusType status_type
, const char *status
, const char *format
, const char *ident
) _printf_(4, 0);
932 bool unit_need_daemon_reload(Unit
*u
);
934 void unit_reset_failed(Unit
*u
);
936 Unit
*unit_following(Unit
*u
);
937 int unit_following_set(Unit
*u
, Set
**s
);
939 const char *unit_slice_name(Unit
*u
);
941 bool unit_stop_pending(Unit
*u
) _pure_
;
942 bool unit_inactive_or_pending(Unit
*u
) _pure_
;
943 bool unit_active_or_pending(Unit
*u
);
944 bool unit_will_restart_default(Unit
*u
);
945 bool unit_will_restart(Unit
*u
);
947 int unit_add_default_target_dependency(Unit
*u
, Unit
*target
);
949 void unit_start_on_failure(Unit
*u
, const char *dependency_name
, UnitDependencyAtom atom
, JobMode job_mode
);
950 void unit_trigger_notify(Unit
*u
);
952 UnitFileState
unit_get_unit_file_state(Unit
*u
);
953 int unit_get_unit_file_preset(Unit
*u
);
955 Unit
* unit_ref_set(UnitRef
*ref
, Unit
*source
, Unit
*target
);
956 void unit_ref_unset(UnitRef
*ref
);
958 #define UNIT_DEREF(ref) ((ref).target)
959 #define UNIT_ISSET(ref) (!!(ref).target)
961 int unit_patch_contexts(Unit
*u
);
963 ExecContext
*unit_get_exec_context(const Unit
*u
) _pure_
;
964 KillContext
*unit_get_kill_context(Unit
*u
) _pure_
;
965 CGroupContext
*unit_get_cgroup_context(Unit
*u
) _pure_
;
967 ExecRuntime
*unit_get_exec_runtime(Unit
*u
) _pure_
;
969 int unit_setup_exec_runtime(Unit
*u
);
970 int unit_setup_dynamic_creds(Unit
*u
);
972 char* unit_escape_setting(const char *s
, UnitWriteFlags flags
, char **buf
);
973 char* unit_concat_strv(char **l
, UnitWriteFlags flags
);
975 int unit_write_setting(Unit
*u
, UnitWriteFlags flags
, const char *name
, const char *data
);
976 int unit_write_settingf(Unit
*u
, UnitWriteFlags mode
, const char *name
, const char *format
, ...) _printf_(4,5);
978 int unit_kill_context(Unit
*u
, KillContext
*c
, KillOperation k
, pid_t main_pid
, pid_t control_pid
, bool main_pid_alien
);
980 int unit_make_transient(Unit
*u
);
982 int unit_require_mounts_for(Unit
*u
, const char *path
, UnitDependencyMask mask
);
984 bool unit_type_supported(UnitType t
);
986 bool unit_is_pristine(Unit
*u
);
988 bool unit_is_unneeded(Unit
*u
);
989 bool unit_is_upheld_by_active(Unit
*u
, Unit
**ret_culprit
);
990 bool unit_is_bound_by_inactive(Unit
*u
, Unit
**ret_culprit
);
992 pid_t
unit_control_pid(Unit
*u
);
993 pid_t
unit_main_pid(Unit
*u
);
995 void unit_warn_if_dir_nonempty(Unit
*u
, const char* where
);
996 int unit_fail_if_noncanonical(Unit
*u
, const char* where
);
998 int unit_test_start_limit(Unit
*u
);
1000 int unit_ref_uid_gid(Unit
*u
, uid_t uid
, gid_t gid
);
1001 void unit_unref_uid_gid(Unit
*u
, bool destroy_now
);
1003 void unit_notify_user_lookup(Unit
*u
, uid_t uid
, gid_t gid
);
1005 int unit_set_invocation_id(Unit
*u
, sd_id128_t id
);
1006 int unit_acquire_invocation_id(Unit
*u
);
1008 bool unit_shall_confirm_spawn(Unit
*u
);
1010 int unit_set_exec_params(Unit
*s
, ExecParameters
*p
);
1012 int unit_fork_helper_process(Unit
*u
, const char *name
, pid_t
*ret
);
1013 int unit_fork_and_watch_rm_rf(Unit
*u
, char **paths
, pid_t
*ret_pid
);
1015 void unit_remove_dependencies(Unit
*u
, UnitDependencyMask mask
);
1017 void unit_export_state_files(Unit
*u
);
1018 void unit_unlink_state_files(Unit
*u
);
1020 int unit_prepare_exec(Unit
*u
);
1022 int unit_log_leftover_process_start(pid_t pid
, int sig
, void *userdata
);
1023 int unit_log_leftover_process_stop(pid_t pid
, int sig
, void *userdata
);
1024 int unit_warn_leftover_processes(Unit
*u
, cg_kill_log_func_t log_func
);
1026 bool unit_needs_console(Unit
*u
);
1028 int unit_pid_attachable(Unit
*unit
, pid_t pid
, sd_bus_error
*error
);
1030 static inline bool unit_has_job_type(Unit
*u
, JobType type
) {
1031 return u
&& u
->job
&& u
->job
->type
== type
;
1034 static inline bool unit_log_level_test(const Unit
*u
, int level
) {
1035 ExecContext
*ec
= unit_get_exec_context(u
);
1036 return !ec
|| ec
->log_level_max
< 0 || ec
->log_level_max
>= LOG_PRI(level
);
1039 /* unit_log_skip is for cases like ExecCondition= where a unit is considered "done"
1040 * after some execution, rather than succeeded or failed. */
1041 void unit_log_skip(Unit
*u
, const char *result
);
1042 void unit_log_success(Unit
*u
);
1043 void unit_log_failure(Unit
*u
, const char *result
);
1044 static inline void unit_log_result(Unit
*u
, bool success
, const char *result
) {
1046 unit_log_success(u
);
1048 unit_log_failure(u
, result
);
1051 void unit_log_process_exit(Unit
*u
, const char *kind
, const char *command
, bool success
, int code
, int status
);
1053 int unit_exit_status(Unit
*u
);
1054 int unit_success_action_exit_status(Unit
*u
);
1055 int unit_failure_action_exit_status(Unit
*u
);
1057 int unit_test_trigger_loaded(Unit
*u
);
1059 void unit_destroy_runtime_data(Unit
*u
, const ExecContext
*context
);
1060 int unit_clean(Unit
*u
, ExecCleanMask mask
);
1061 int unit_can_clean(Unit
*u
, ExecCleanMask
*ret_mask
);
1063 bool unit_can_freeze(Unit
*u
);
1064 int unit_freeze(Unit
*u
);
1065 void unit_frozen(Unit
*u
);
1067 int unit_thaw(Unit
*u
);
1068 void unit_thawed(Unit
*u
);
1070 int unit_freeze_vtable_common(Unit
*u
);
1071 int unit_thaw_vtable_common(Unit
*u
);
1073 Condition
*unit_find_failed_condition(Unit
*u
);
1075 /* Macros which append UNIT= or USER_UNIT= to the message */
1077 #define log_unit_full_errno_zerook(unit, level, error, ...) \
1079 const Unit *_u = (unit); \
1080 const int _l = (level); \
1081 bool _do_log = !(log_get_max_level() < LOG_PRI(_l) || \
1082 (_u && !unit_log_level_test(_u, _l))); \
1083 const ExecContext *_c = _do_log && _u ? \
1084 unit_get_exec_context(_u) : NULL; \
1085 LOG_CONTEXT_PUSH_IOV(_c ? _c->log_extra_fields : NULL, \
1086 _c ? _c->n_log_extra_fields : 0); \
1087 !_do_log ? -ERRNO_VALUE(error) : \
1088 _u ? log_object_internal(_l, error, PROJECT_FILE, __LINE__, __func__, _u->manager->unit_log_field, _u->id, _u->manager->invocation_log_field, _u->invocation_id_string, ##__VA_ARGS__) : \
1089 log_internal(_l, error, PROJECT_FILE, __LINE__, __func__, ##__VA_ARGS__); \
1092 #define log_unit_full_errno(unit, level, error, ...) \
1094 int _error = (error); \
1095 ASSERT_NON_ZERO(_error); \
1096 log_unit_full_errno_zerook(unit, level, _error, ##__VA_ARGS__); \
1099 #define log_unit_full(unit, level, ...) (void) log_unit_full_errno_zerook(unit, level, 0, __VA_ARGS__)
1101 #define log_unit_debug(unit, ...) log_unit_full(unit, LOG_DEBUG, __VA_ARGS__)
1102 #define log_unit_info(unit, ...) log_unit_full(unit, LOG_INFO, __VA_ARGS__)
1103 #define log_unit_notice(unit, ...) log_unit_full(unit, LOG_NOTICE, __VA_ARGS__)
1104 #define log_unit_warning(unit, ...) log_unit_full(unit, LOG_WARNING, __VA_ARGS__)
1105 #define log_unit_error(unit, ...) log_unit_full(unit, LOG_ERR, __VA_ARGS__)
1107 #define log_unit_debug_errno(unit, error, ...) log_unit_full_errno(unit, LOG_DEBUG, error, __VA_ARGS__)
1108 #define log_unit_info_errno(unit, error, ...) log_unit_full_errno(unit, LOG_INFO, error, __VA_ARGS__)
1109 #define log_unit_notice_errno(unit, error, ...) log_unit_full_errno(unit, LOG_NOTICE, error, __VA_ARGS__)
1110 #define log_unit_warning_errno(unit, error, ...) log_unit_full_errno(unit, LOG_WARNING, error, __VA_ARGS__)
1111 #define log_unit_error_errno(unit, error, ...) log_unit_full_errno(unit, LOG_ERR, error, __VA_ARGS__)
1114 # define log_unit_trace(...) log_unit_debug(__VA_ARGS__)
1115 # define log_unit_trace_errno(...) log_unit_debug_errno(__VA_ARGS__)
1117 # define log_unit_trace(...) do {} while (0)
1118 # define log_unit_trace_errno(e, ...) (-ERRNO_VALUE(e))
1121 #define log_unit_struct_errno(unit, level, error, ...) \
1123 const Unit *_u = (unit); \
1124 const int _l = (level); \
1125 bool _do_log = unit_log_level_test(_u, _l); \
1126 const ExecContext *_c = _do_log && _u ? \
1127 unit_get_exec_context(_u) : NULL; \
1128 LOG_CONTEXT_PUSH_IOV(_c ? _c->log_extra_fields : NULL, \
1129 _c ? _c->n_log_extra_fields : 0); \
1131 log_struct_errno(_l, error, __VA_ARGS__, LOG_UNIT_ID(_u)) : \
1132 -ERRNO_VALUE(error); \
1135 #define log_unit_struct(unit, level, ...) log_unit_struct_errno(unit, level, 0, __VA_ARGS__)
1137 #define log_unit_struct_iovec_errno(unit, level, error, iovec, n_iovec) \
1139 const Unit *_u = (unit); \
1140 const int _l = (level); \
1141 bool _do_log = unit_log_level_test(_u, _l); \
1142 const ExecContext *_c = _do_log && _u ? \
1143 unit_get_exec_context(_u) : NULL; \
1144 LOG_CONTEXT_PUSH_IOV(_c ? _c->log_extra_fields : NULL, \
1145 _c ? _c->n_log_extra_fields : 0); \
1147 log_struct_iovec_errno(_l, error, iovec, n_iovec) : \
1148 -ERRNO_VALUE(error); \
1151 #define log_unit_struct_iovec(unit, level, iovec, n_iovec) log_unit_struct_iovec_errno(unit, level, 0, iovec, n_iovec)
1153 /* Like LOG_MESSAGE(), but with the unit name prefixed. */
1154 #define LOG_UNIT_MESSAGE(unit, fmt, ...) LOG_MESSAGE("%s: " fmt, (unit)->id, ##__VA_ARGS__)
1155 #define LOG_UNIT_ID(unit) (unit)->manager->unit_log_format_string, (unit)->id
1156 #define LOG_UNIT_INVOCATION_ID(unit) (unit)->manager->invocation_log_format_string, (unit)->invocation_id_string
1158 const char* collect_mode_to_string(CollectMode m
) _const_
;
1159 CollectMode
collect_mode_from_string(const char *s
) _pure_
;
1161 typedef struct UnitForEachDependencyData
{
1162 /* Stores state for the FOREACH macro below for iterating through all deps that have any of the
1163 * specified dependency atom bits set */
1164 UnitDependencyAtom match_atom
;
1165 Hashmap
*by_type
, *by_unit
;
1167 Iterator by_type_iterator
, by_unit_iterator
;
1168 Unit
**current_unit
;
1169 } UnitForEachDependencyData
;
1171 /* Iterates through all dependencies that have a specific atom in the dependency type set. This tries to be
1172 * smart: if the atom is unique, we'll directly go to right entry. Otherwise we'll iterate through the
1173 * per-dependency type hashmap and match all dep that have the right atom set. */
1174 #define _UNIT_FOREACH_DEPENDENCY(other, u, ma, data) \
1175 for (UnitForEachDependencyData data = { \
1176 .match_atom = (ma), \
1177 .by_type = (u)->dependencies, \
1178 .by_type_iterator = ITERATOR_FIRST, \
1179 .current_unit = &(other), \
1182 UnitDependency _dt = _UNIT_DEPENDENCY_INVALID; \
1185 if (data.by_type && ITERATOR_IS_FIRST(data.by_type_iterator)) { \
1186 _dt = unit_dependency_from_unique_atom(data.match_atom); \
1188 data.by_unit = hashmap_get(data.by_type, UNIT_DEPENDENCY_TO_PTR(_dt)); \
1189 data.current_type = UNIT_DEPENDENCY_TO_PTR(_dt); \
1190 data.by_type = NULL; \
1191 _found = !!data.by_unit; \
1195 _found = hashmap_iterate(data.by_type, \
1196 &data.by_type_iterator, \
1197 (void**)&(data.by_unit), \
1198 (const void**) &(data.current_type)); \
1201 if ((unit_dependency_to_atom(UNIT_DEPENDENCY_FROM_PTR(data.current_type)) & data.match_atom) != 0) \
1202 for (data.by_unit_iterator = ITERATOR_FIRST; \
1203 hashmap_iterate(data.by_unit, \
1204 &data.by_unit_iterator, \
1206 (const void**) data.current_unit); )
1208 /* Note: this matches deps that have *any* of the atoms specified in match_atom set */
1209 #define UNIT_FOREACH_DEPENDENCY(other, u, match_atom) \
1210 _UNIT_FOREACH_DEPENDENCY(other, u, match_atom, UNIQ_T(data, UNIQ))